{"id":1018,"date":"2008-09-03T00:24:52","date_gmt":"2008-09-03T00:24:52","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1018"},"modified":"2015-09-09T19:39:18","modified_gmt":"2015-09-09T11:39:18","slug":"productive-botnets","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2008\/09\/productive-botnets\/","title":{"rendered":"Productive Botnets"},"content":{"rendered":"

[ad]<\/p>\n

We all know what botnets are (think so), but anyway let’s see a proper definition of botnets taken from shadowserver<\/a>… and I quote:<\/p>\n

\nA botnet is a collection of computers, connected to the internet, that interact to accomplish some distributed task. Although such a collection of computers can be used for useful and constructive applications, the term botnet typically refers to such a system designed and used for illegal purposes. Such systems are composed of compromised machines that are assimilated without their owner’s knowlege.\n<\/p><\/blockquote>\n

Among the DDoS usage of botnets there are also know usages like:<\/p>\n

Keylogging<\/b><\/p>\n

\nKeylogging is perhaps the most threatening botnet feature to an individual’s privacy. Many bots listen for keyboard activity and report the keystrokes upstream to the bot herder. Some bots have builtin triggers to look for web visits to particular websites where passwords or bank account information is entered. This gives the herder unprecendented ability to gain access to personal information and accounts belonging to thousands of people.\n<\/p><\/blockquote>\n

Warez<\/b><\/p>\n

\nBotnets can be used to steal, store, or propogate warez. Warez constitutes any illegally obtained and\/or pirated software. Bots can search hard drives for software and licenses installed on a victims machine, and the herder can easily transfer it off for duplication and distribution. Furthermore, drones are used to archive copies of warez found from other sources. As a whole, a botnet has a great deal of storage capacity.\n<\/p><\/blockquote>\n

Spam<\/b><\/p>\n

\nBotnets often are used as a mechanism of propogating spam. Compromised drones can forward spam emails or phish scams to many 3rd party victims. Furthermore, instant messaging accounts can be utilized to forward malicious links or advertisements to every contact in the victim’s address book. By spreading spam-related materials through a botnet, a herder can mitigate the threat of being caught as it is thousands of individual computers that are taking on the brunt of the dirty work.\n<\/p><\/blockquote>\n

and the one I’m gonna focus on (well, something derived from it) -> Click Fraud<\/b><\/p>\n

\nBotnets can be used to engage in Click Fraud, where the bot software is used to visit web pages and automatically “click” on advertisement banners. Herders have been using this mechanism to steal large sums of money from online advertising firms that pay a small reward for each page visit. With a botnet of thousands of drones, each clicking only a few times, the returns can be quite large. Since the clicks are each coming from seperate machines scattered accross the globe, it looks like legitimate traffic to the untrained investigator.\n<\/p><\/blockquote>\n

My point is that many herders (botnet organizers) use a pretty raw Click Fraud mechanism, mainly just issue the command to the bot to retrieve the page and it’s advertisement and rebuild a query string to the advertisers website with the referer header set… as mentioned in the definition this may seem sometimes legitimate traffic to some, but big advertising companies would notice that something isn’t right, stuff like hundreds of clicks at (almost) the same time and similar scenario’s…<\/p>\n

The new approach (better) would be to generate only website traffic at random hours because highly visited websites use pay-per-post<\/a> campaigns (more info about pay-per-post<\/a>)… and there are also other advertising systems like simple banner\/ad placement on the website\/blog and via the traffic stats you get paid…<\/p>\n

How could botnets help? Well botnets would act as general users\/viewers of the blog\/website thus making legitimate traffic… masked by a randomized visit system… a general scenario:<\/p>\n